Malware Analysis Report

2024-09-09 16:13

Sample ID 240417-1znr3sgg7x
Target 253f00caeaf96575b5e47073fc00ab0ebedc6517810f1bdeccbed8be259fa9c0.bin
SHA256 253f00caeaf96575b5e47073fc00ab0ebedc6517810f1bdeccbed8be259fa9c0
Tags
discovery irata
score
10/10

Table of Contents

Analysis Overview

MITRE ATT&CK Matrix

Analysis: static1

Detonation Overview

Signatures

Analysis: behavioral1

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis: behavioral2

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis: behavioral3

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis Overview

score
10/10

SHA256

253f00caeaf96575b5e47073fc00ab0ebedc6517810f1bdeccbed8be259fa9c0

Threat Level: Known bad

The file 253f00caeaf96575b5e47073fc00ab0ebedc6517810f1bdeccbed8be259fa9c0.bin was found to be: Known bad.

Malicious Activity Summary

discovery irata

Irata family

Irata payload

Acquires the wake lock

Reads information about phone network operator.

Requests dangerous framework permissions

MITRE ATT&CK Matrix

N/A

Analysis: static1

Detonation Overview

Reported

2024-04-17 22:05

Signatures

Irata family

irata

Irata payload

Description Indicator Process Target
N/A N/A N/A N/A

Requests dangerous framework permissions

Description Indicator Process Target
Allows an app to post notifications. android.permission.POST_NOTIFICATIONS N/A N/A
Allows an application to read SMS messages. android.permission.READ_SMS N/A N/A
Allows read only access to phone state, including the current cellular network information, the status of any ongoing calls, and a list of any PhoneAccounts registered on the device. android.permission.READ_PHONE_STATE N/A N/A
Allows an app to access approximate location. android.permission.ACCESS_COARSE_LOCATION N/A N/A
Allows an application to receive SMS messages. android.permission.RECEIVE_SMS N/A N/A
Allows an application to send SMS messages. android.permission.SEND_SMS N/A N/A

Analysis: behavioral1

Detonation Overview

Submitted

2024-04-17 22:05

Reported

2024-04-17 22:29

Platform

android-x86-arm-20240221-en

Max time kernel

4s

Max time network

131s

Command Line

com.temptation.lydia

Signatures

Acquires the wake lock

Description Indicator Process Target
Framework service call android.os.IPowerManager.acquireWakeLock N/A N/A

Processes

com.temptation.lydia

Network

Country Destination Domain Proto
N/A 224.0.0.251:5353 udp
US 1.1.1.1:53 semanticlocation-pa.googleapis.com udp
GB 142.250.187.206:443 tcp
US 1.1.1.1:53 android.apis.google.com udp
GB 216.58.213.14:443 android.apis.google.com tcp

Files

/data/data/com.temptation.lydia/files/PersistedInstallation3522494211696437188tmp

MD5 ec729d2cc02f01775cb423b233a863cf
SHA1 1992efbba7b5e9f264b396a3feddb72229609024
SHA256 18c516d50d3636c7f3a23ede1469d2d794026cb559da1fbfb6a1cbb43b62cf98
SHA512 d624bfd7fd7712e5e857ac9604271457eaca4b3461fa6546d4fef58100b53717255498e9558cee61e382f9f13b7d90b58b4534e26c2a77d04afdf65811368ce3

Analysis: behavioral2

Detonation Overview

Submitted

2024-04-17 22:05

Reported

2024-04-17 22:25

Platform

android-x64-20240221-en

Max time kernel

3s

Max time network

151s

Command Line

com.temptation.lydia

Signatures

Acquires the wake lock

Description Indicator Process Target
Framework service call android.os.IPowerManager.acquireWakeLock N/A N/A

Reads information about phone network operator.

discovery

Processes

com.temptation.lydia

Network

Country Destination Domain Proto
N/A 224.0.0.251:5353 udp
US 1.1.1.1:53 ssl.google-analytics.com udp
GB 142.250.180.8:443 ssl.google-analytics.com tcp
GB 142.250.178.14:443 tcp
US 1.1.1.1:53 android.apis.google.com udp
GB 142.250.187.238:443 android.apis.google.com tcp
GB 216.58.204.68:443 tcp
US 1.1.1.1:53 www.google.com udp
GB 142.250.179.228:443 www.google.com tcp
GB 142.250.187.238:443 android.apis.google.com tcp
GB 142.250.200.2:443 tcp

Files

/data/data/com.temptation.lydia/files/PersistedInstallation2960799710968358586tmp

MD5 5d0b99e8e539ac37c8a9ed273f1feb2a
SHA1 c4ca6d4a3f77ce06249f6f3dc56fc98df2d3e675
SHA256 261eb4a7c7c3c8cf7b35680f3ec26cdaa991415857f7c97b6fbc584b314f852f
SHA512 1684fdfa4e1b689034d84590dca72f24195d42aa897c67d4ec01d056ee9e79bc63ebf0c9453e8babde8f8e23fd26dfc624adddbf9c16dd96586b641345f79a0a

Analysis: behavioral3

Detonation Overview

Submitted

2024-04-17 22:05

Reported

2024-04-17 22:26

Platform

android-x64-arm64-20240221-en

Max time kernel

3s

Max time network

131s

Command Line

com.temptation.lydia

Signatures

Acquires the wake lock

Description Indicator Process Target
Framework service call android.os.IPowerManager.acquireWakeLock N/A N/A

Reads information about phone network operator.

discovery

Processes

com.temptation.lydia

Network

Country Destination Domain Proto
N/A 224.0.0.251:5353 udp
GB 142.250.200.14:443 udp
GB 142.250.200.46:443 tcp
US 1.1.1.1:53 android.apis.google.com udp
GB 142.250.178.14:443 android.apis.google.com tcp
US 1.1.1.1:53 ssl.google-analytics.com udp
GB 172.217.16.232:443 ssl.google-analytics.com tcp
GB 142.250.178.14:443 android.apis.google.com tcp
GB 142.250.200.4:443 tcp
GB 142.250.200.4:443 tcp

Files

/data/data/com.temptation.lydia/files/PersistedInstallation2510640441620850566tmp

MD5 d12bd4ea01079ccb6f1446c1222f2e2d
SHA1 ffc606915cbfc0e4849a2ef561e9caa4b13d5ff3
SHA256 d66d4688103fa30f8cebad4b52407c00465c94f421e2c98bbc5b250ed1606788
SHA512 a1488ec1adb9b40c9f0a00278433e56dda55ec13cd3270ef52414ef9a1f533a460bac88eeac9747a09eb265eda185e3f271ae37501abe30d235437c998670f95